Bialomazur / BrutusLinks
Botnet targeting Windows machines π
β45Updated 4 years ago
Alternatives and similar repositories for Brutus
Users that are interested in Brutus are comparing it to the libraries listed below
Sorting:
- Mini Wordress Exploiter using CVE2020β31Updated 4 years ago
- AAP Finder (Advanced Admin Page Finder) is a tool written in Python3 with advanced functionalitiesβ48Updated last year
- Embedding executable files in PDF Documentsβ45Updated 6 years ago
- remote administrator frameworkβ22Updated 9 months ago
- Hacking Tools Z0172CKβ31Updated last year
- webpwn3r ======== WebPwn3r - Web Applications Security Scanner. By Ebrahim Hegazy - @Zigoo0 Thanks: @lnxg33k, @dia2diab @Aelhemily, @oβ¦β26Updated 6 years ago
- ORhunter is an Open Redirect Vulnerability Scanner which Passively Crawls URLs from 3 Sources & Then Filter Potential URLs based on Paramβ¦β40Updated last year
- Automating the SQL Injection through Google dorks.β24Updated 2 years ago
- Working on a small SQL Injection frameworkβ17Updated 7 months ago
- A URL shortenerβ18Updated 6 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipelineβ38Updated 6 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibβ¦β62Updated 5 years ago
- !!!WORLD'S π #1π₯ TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most toβ¦β47Updated 2 years ago
- this FUD Payloadβ39Updated 3 years ago
- phishfactory offers a variety of email templates for spear-phishing attacks. [more templates to still be added]β21Updated 4 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.β27Updated 5 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardwareβ¦β46Updated 2 years ago
- detect trojans in an easy way π‘οΈβ29Updated 6 years ago
- Inject Metasploit Shell Code in Legitimate Processβ11Updated 4 years ago
- Fast exploitation based on metasploit.β74Updated 5 years ago
- Bruteforce tool for Pentester's lucky day targeting SSH-services.β13Updated 4 years ago
- Keylogger for ethical hackersβ15Updated 3 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)β40Updated 4 years ago
- This is a combination of a hacking and a cracking tool.β30Updated 4 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspaceβ28Updated 4 years ago
- bruteforcing gmail (TLS/SSL)β40Updated 3 years ago
- β17Updated 5 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.β16Updated 4 years ago
- Windows Auto Post Exploitation - For ReD Teamβ15Updated 5 years ago
- An advanced reverse shell written in Python3.β21Updated 4 years ago